Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-3125
PUBLISHED
More InfoOfficial Page
Assigner-cloudflare
Assigner Org ID-a22f1246-ba21-4bb4-a601-ad51614c1513
View Known Exploited Vulnerability (KEV) details
Published At-04 Mar, 2026 | 18:14
Updated At-04 Mar, 2026 | 18:58
Rejected At-
▼CVE Numbering Authority (CNA)
SSRF vulnerability in opennextjs-cloudflare via /cdn-cgi/ path normalization bypass

A Server-Side Request Forgery (SSRF) vulnerability was identified in the @opennextjs/cloudflare package, resulting from a path normalization bypass in the /cdn-cgi/image/ handler.The @opennextjs/cloudflare worker template includes a /cdn-cgi/image/ handler intended for development use only. In production, Cloudflare's edge intercepts /cdn-cgi/image/ requests before they reach the Worker. However, by substituting a backslash for a forward slash (/cdn-cgi\image/ instead of /cdn-cgi/image/), an attacker can bypass edge interception and have the request reach the Worker directly. The JavaScript URL class then normalizes the backslash to a forward slash, causing the request to match the handler and trigger an unvalidated fetch of arbitrary remote URLs. For example: https://victim-site.com/cdn-cgi\image/aaaa/https://attacker.com In this example, attacker-controlled content from attacker.com is served through the victim site's domain (victim-site.com), violating the same-origin policy and potentially misleading users or other services. Note: This bypass only works via HTTP clients that preserve backslashes in paths (e.g., curl --path-as-is). Browsers normalize backslashes to forward slashes before sending requests. Additionally, Cloudflare Workers with Assets and Cloudflare Pages suffer from a similar vulnerability. Assets stored under /cdn-cgi/ paths are not publicly accessible under normal conditions. However, using the same backslash bypass (/cdn-cgi\... instead of /cdn-cgi/...), these assets become publicly accessible. This could be used to retrieve private data. For example, Open Next projects store incremental cache data under /cdn-cgi/_next_cache, which could be exposed via this bypass.

Affected Products
Vendor
opennextjs
Product
@opennextjs/cloudflare
Collection URL
https://www.npmjs.com/package/@opennextjs/cloudflare
Package Name
@opennextjs/cloudflare
Repo
https://github.com/opennextjs/opennextjs-cloudflare
Modules
  • packages/cloudflare/src/cli/templates/worker.ts
Platforms
  • Cloudflare Workers
Default Status
unaffected
Versions
Affected
  • From 0 before 1.17.1 (npm)
Problem Types
TypeCWE IDDescription
CWECWE-918CWE-918 Server-Side Request Forgery (SSRF)
CWECWE-706CWE-706 Use of Incorrectly-Resolved Name or Reference
Type: CWE
CWE ID: CWE-918
Description: CWE-918 Server-Side Request Forgery (SSRF)
Type: CWE
CWE ID: CWE-706
Description: CWE-706 Use of Incorrectly-Resolved Name or Reference
Metrics
VersionBase scoreBase severityVector
4.07.7HIGH
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:H/SI:N/SA:N
Version: 4.0
Base score: 7.7
Base severity: HIGH
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:H/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-664CAPEC-664 Server Side Request Forgery
CAPEC-267CAPEC-267 Leverage Alternate Encoding
CAPEC ID: CAPEC-664
Description: CAPEC-664 Server Side Request Forgery
CAPEC ID: CAPEC-267
Description: CAPEC-267 Leverage Alternate Encoding
Solutions

Server-side updates to Cloudflare's Workers platform to block backslash path normalization bypasses for /cdn-cgi requests. The update automatically mitigates the issue for all existing and any future sites deployed to Cloudflare Workers.

In addition to the platform level fix, root cause fix https://github.com/opennextjs/opennextjs-cloudflare/pull/1147 has been implemented to the Cloudflare adapter for Open Next. The patched version of the adapter is found at @opennextjs/cloudflare@1.17.1 ( https://www.npmjs.com/package/@opennextjs/cloudflare https://www.npmjs.com/package/@opennextjs/cloudflare )

Dependency update https://github.com/opennextjs/opennextjs-cloudflare/pull/1150 to the Next.js template used with create-cloudflare (c3) to use the fixed version of the Cloudflare adapter for Open Next.

Configurations

Workarounds

Exploits

Credits

finder
https://x.com/ez_z3r
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/opennextjs/opennextjs-cloudflare/pull/1147
patch
https://www.npmjs.com/package/@opennextjs/cloudflare/v/1.17.1
product
https://github.com/advisories/GHSA-rvpw-p7vw-wj3m
related
https://www.cve.org/cverecord?id=CVE-2025-6087
related
Hyperlink: https://github.com/opennextjs/opennextjs-cloudflare/pull/1147
Resource:
patch
Hyperlink: https://www.npmjs.com/package/@opennextjs/cloudflare/v/1.17.1
Resource:
product
Hyperlink: https://github.com/advisories/GHSA-rvpw-p7vw-wj3m
Resource:
related
Hyperlink: https://www.cve.org/cverecord?id=CVE-2025-6087
Resource:
related
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found